This paper describes FILE stream overflow vulnerabilities and illustrates how they can be exploited. The author uses a FILE stream overflow in dvips as a case study.
1ba52e016c0392136d39eef96e00aa376e076ea025a6eab55d090bf725634635
© 2024 Packet Storm. All rights reserved.